meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />

Friday, May 09, 2008

Beware of 'free' infosec

By Brent Huston, MicroSolved, Inc.

There has been a lot of hype in the last few weeks about security vendors who offer assessments on the "we find holes or it's free" basis. What's wrong with this approach? First off, security testing choices should not be based on price. They should be based on risk. ...continue reading 'Beware of 'free' infosec'

Labels:

Monday, May 05, 2008

How to protect against IM threats

Did you know that IM programs automatically create and store logs of all conversations on a user's computer? Do your users know that? They should. Your first step in protecting against IM threats is to learn about the best safety and security practices, educate users, and create policies around instant messaging.

Labels: ,

Tuesday, January 15, 2008

Information security is everyone's job

Paula W. Hamm, Symantec Corp

The effectiveness of even the best technology and processes put in place by IT personnel is frequently undermined if employees do not understand both the value of the organization's information assets and their role in securing these assets. With proper education and training, employees can become an organization's strongest line of defense and its most valuable security asset. ...continue reading 'Information security is everyone's job'

Labels: